请输入您要查询的英文单词:

 

单词 key derivation function
释义
BETA

Examples ofkey derivation function

Dictionary> Examples ofkey derivation function
key derivation functionisn’t in the Cambridge Dictionary yet. You can help!
Add a definition
Use of akeyderivationfunctionthat employs a salt makes this attack infeasible.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Periodical application of thekeyderivationfunctionwill result in security benefits.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
The password entered by the user is run through akeyderivationfunctionto create a hashed version of the new password, which is saved.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
For example, each encryption key can be generated from the underlying key material using a cryptographic hash function or otherkeyderivationfunction.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
To build a key from shared secret, thekeyderivationfunctionshould be used.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Thus, the key management protocol needs to exchange only one master key, all the necessary session keys are generated by applying thekeyderivationfunction.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Using akeyderivationfunction, the challenge value and the secret may be combined to generate an unpredictable encryption key for the session.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Key derivation functions are also used to derive keys from secret passwords or passphrases.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Key derivation functions are often used as components of multiparty key-agreement protocols.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.

随便看

 

英汉双解词典包含207842条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/8/17 18:41:51